news

Breaking Cyber News From Cyberint

Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.

  • Jun 10, 2025

    • Telecommunications
    • Credentials In Files
    • Match Legitimate Name Or Location
    • United States
    • Spearphishing Link
    • Amos
    • Spectrum
    • Sudo And Sudo Caching
    • North America
    • Unix Shell
    • Ingress Tool Transfer
    • Disable Or Modify Tools

    New Clickfix Infostealer Campaign Targets macOS Users

    Cybersecurity researchers have identified a new malware campaign that uses social engineering tactics to distribute an information stealer known as Atomic macOS Stealer (AMOS) targeting Apple macOS systems. The campaign employs typosquatting domains that mimic the U.S.-based telecom provider Spectrum, tricking users into executing a malicious shell script that steals system passwords and downloads the AMOS variant. The attack begins on a fake webpage that prompts users to complete a CAPTCHA verification, ultimately leading them to execute harmful commands under the guise of fixing a non-existent issue. The campaign is believed to be orchestrated by Russian-speaking cybercriminals, as indicated by the presence of Russian language comments in the malware's code.

  • May 28, 2025

    • Remote System Discovery
    • Smb/Windows Admin Shares
    • Escape To Host
    • Business Services
    • Ingress Tool Transfer
    • Lateral Tool Transfer
    • Web Protocols
    • Exploitation For Client Execution
    • External Remote Services
    • Match Legitimate Name Or Location
    • United States
    • Obfuscated Files Or Information
    • Docker
    • Network Service Discovery
    • North America
    • Exploit Public-Facing Application
    • Change Default File Association
    • Deploy Container
    • Unix Shell
    • Resource Hijacking

    Cryptojacking Campaign Targets Misconfigured Docker APIs

    A new malware campaign has emerged, targeting misconfigured Docker API instances to create a cryptocurrency mining botnet focused on mining Dero currency. The threat actor exploits insecurely published Docker APIs to gain access to running containerized infrastructures, propagating the malware through a worm-like mechanism to infect other exposed Docker instances. The attack utilizes two main components: a propagation malware named 'nginx' that scans for vulnerable Docker APIs, and a 'cloud' Dero cryptocurrency miner. This campaign has been linked to previous cryptojacking operations and poses a significant risk to any network with insecure Docker APIs.

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo